Our Security Philosophy

In today's electronic age, it's extremely important to be careful when doing business online or over the telephone. You should always stay informed about security issues and activities that could affect your economic future. Check back here often for any updated security information.

Phishing

E-mail phishing attacks are attempts by criminals to gain access to your personal information. Criminals send spam e-mails created to sound and look like official notices. Information entered into these websites goes directly to the criminal. These e-mails and websites usually look trustworthy and convincing. Keep your personal information safe with these Tips.

Identity Theft

Identity theft involves personal information such as name, address, date of birth, social security number or a mother's maiden name being stolen in order to assume an individual's identity. Learn More.

Voice Phishing (Vishing)

Voice phishing attacks are attacks by criminals to gain access to your personal information utilizing the telephone. Criminals use phone systems to call phone numbers and play an automated recording to alert the consumer that their credit card or debit card has had fraudulent activity or that their account has had unusual activity. The message typically instructs the consumer to call a phone number immediately. When the victim calls the number an automated system instructs the caller to enter their card information or account number using the keypad. The call can also be used to collect other sensitive personal information. A trustworthy organization will never request sensitive information in this manner.

Text Message Phishing (Smishing)

Text message phishing is a form of criminal activity using text message to acquire personal information utilizing cell phone text messages. The text message will include an alert requesting immediate attention with a website URL or phone number in an attempt to convince consumers to divulge sensitive personal information. These text messages are not sent from legitimate sources.